Starting from:

$30

Project 2 – The Threaded Two–Dimensional Discrete Fourier Transform

ECE6122/6122 
Project 2 – The Threaded Two–Dimensional Discrete Fourier Transform

Given a one–dimensional array of complex or real input values of length N, the Discrete Fourier Transform
consists af an array of size N computed as follows:
H[n] =
N
X−1
k=0
Wnkh[k] where W = e
−j2π/N = cos(2π/N) − jsin(2π/N) where j =

−1 (1)
For all equations in this document, we use the following notational conventions. h is the discrete–time sampled signal
array. H is the Fourier transform array of h. N is the length of the sample array, and is always assumed to be an even
power of 2. n is an index into the h and H arrays, and is always in the range 0 . . .(N − 1). k is also an index into h
and H, and is the summation variable when needed. j is the square root of negative one.
An important special case of the above equation is the case of a sample of length 1. Since the summation variable
k is exactly 0, the Wnk term becomes 1, and thus H[0] = h[0]. The Fourier transform of a sample set of length 1 is
just the original sample set unmodified.
As in project 1, we are going to compute a two–dimensional Discrete Fourier Transform of a given input image.
As before, we first compute the one–dimensional transforms on eacy row, followed by the one–dimensional transforms
on each column. However, there are two major differences in this assignment and the prior one.
1. We will use the much more efficient Danielson–Lanczos approach for the one–dimensional transforms (described in detail below). This approach has a running time proportional to Nlog2N as opposed to the N2
running time of the prior algorithm.
2. We are going to use 16 threads, plus the “main” thread, on a single computing platform to cooperate to perform
the two–dimensional transform. All threads will have access to the same memory locations (ie. the original 2d
image).
3. The main thread will create each of the 16 helper threads and pass the thread id as the argument to the thread
function. Each thread will perform a 1D transform on a set of rows (identical to the way we did this with
MPI). They should then barrier and then do the second 1D transform on the columns. There are a few ways to
implement this, so think about a good approach.
Graduate Students must do the following:
1. Design and implement your own barrier code to use in the assignment.
2. using 16 Threads, compute the forward and reverse transforms for the 2D Large tower image using the efficient
Danielson–Lanczos method described below. The output file names should be identical to those used in the
2D-FFT (MPI) lab.
Undergraduate Students must do the following:
1. Using 16 threads, computer the 2-D FFT for the provided large tower image. Write both the “after 1D” and
“after 2D”files using the same output file names used in the 2D-FFT(MPI) lab.
2. Use the standard barrier code found in the pthreads library.
Description of the Danielson–Lanczos Algorithm
1
From equation 1, it appears that to compute the DFT for a sample of length N, it must take N2 operations, since
to compute each element of H requires a summation overall all samples in h. However, Danielson and Lanczos
demonstrated a method that reduces the number of operations from N2
to Nlog2
(N). The insight of Danielson and
Lanczos was that the FFT of an array of length N is in fact the sum of two smaller FFT’s of length N/2, where the first
half–length FFT contains only the even numbered samples, and the second contains only the odd numbered samples.
The proof of the Danielson–Lanczos Lemma is quite simple, as follows:
H[n] =
N
X−1
k=0
e
−j2πkn/N h[k]
=
N/
X
2−1
k=0
e
−j2π2kn/N h[2k] +
N/
X
2−1
k=0
e
−j2π(2k+1)n/N h[2k + 1]
=
N/
X
2−1
k=0
e
−j2πkn/(N/2)h[2k] +
N/
X
2−1
k=0
e
−j2πkn/(N/2)e
−j2πn/N h[2k + 1]
=
N/
X
2−1
k=0
e
−j2πkn/(N/2)h[2k] + Wn
N/
X
2−1
k=0
e
−j2πkn/(N/2)h[2k + 1]
H[n] = He
n mod (N/2) + WnHo
n mod (N/2)
(2)
where He
n
refers to the n
th element of the Fourier transform of length N/2 formed from the even numbered elements
of the original length N samples, and Ho
n
refers to the n
th element of the odd numbered samples. Thus the Fourier
transform of an array of length N can be computed by summing two transforms of length N/2. Then each of the N/2
transforms can be computed as the sum of two transforms of length N/4, which in turn can be computed as the sum of
two transforms of length N/8. This process can be repeated until we have a transform of length 1, which we already
know can trivially be computed.
Using the equation for the Fourier transform and the Danielson–Lanczos lemma, we can design an easy–to–
implement and efficient algorithm for computing the Discrete Fourier Transform for a set of signal samples of length
N = 2m. This algorithm is known as the Cooley-Tukey algorithm. By using the Cooley-Tukey algorithm, we can
reduce the computational complexity of the DFT computation from N2 operations to Nlog2
(N)
Step 1. Reordering the initial h array. Consider a simple case of a sample set of length 8, h[0], h[1] . . . h[7].
Dividing this into the even samples and odd samples, we get:
He = h[0] + h[2] + h[4] + h[6]
Ho = h[1] + h[3] + h[5] + h[7] (3)
Further dividing the even set into it’s even and odd components, and similarly dividing the odd set into it’s even and
odd components, we get:
Hee = h[0] + h[4]
Heo = h[2] + h[6]
Hoe = h[1] + h[5]
Hoo = h[3] + h[7]
(4)
Finally, dividing each of these into it’s even and odd components we get:
2
Heee = h[0]
Heeo = h[4]
Heoe = h[2]
Heoo = h[6]
Hoee = h[1]
Hoeo = h[5]
Hooe = h[3]
Hooo = h[7]
(5)
Since each line of equation 5 is just a Fourier transform of length one, we can trivially compute each of these. The
question now becomes is there an easy way to determine which of the h[n] values corresponds to each of the Hxxx
components. In other words, in equation 5 we determined that Heoo (for example) is equal to h[6], but is there a
general way to find this mapping? It turns out that there is, by simply assigning a 0 value to each e (even iteration) and
and 1 values to each o (odd iteration), and then interpreting the resulting binary value in reverse order. In our example
of Heoo, the binary value is 011, which is the value 6 when read from right to left. The first step of the Cooley–Tukey
algorithm is to simply transform the original h array from natural ordering (h[0], h[1], h[2], . . . h[N − 1]) to the bit
reversed ordering. For an original vector of length 8, the reverse ordering is the sequence shown in equation 5. For
original array lengths other than 8, the reversed orderings are of course different, but always easy to compute.
After reordering the original h array, we can easily compute the four sets of Fourier transforms of length 2, since
the required elements are adjacent in the reordered array. Referring to equation 4, we see that the ee values are h[0]
and h[4], which are the first two elements in the reordered array; the eo values are h[2] and h[6] which are the next
two, and so on. Similarly we can compute the two sets of Fourier transforms of length 4, since the e elements are the
first four and the o elements are the next four. Thus the bookkeeping needed for determining which elements of the h
array are needed at each step is quite simple.
Step 2. Precomputing the Wn values. Recall the definition of the complex Weight factor from equation 1 is:
W = e
−j2π/N = cos(2π/N) − jsin(2π/N)
Wn = e
−j2πn/N = cos(2πn/N) − jsin(2πn/N)
(6)
Further recall that we need the value Wn in equation 2 to combine the even and odd sub–transforms. Since n is the
array index in the original h array (of length N), there are exactly N distinct Wn values (W0
, W1
, . . . WN−1
). Since
these are somewhat expensive to compute (two trigonometric functions), we can save some time by precomputing the
N distinct weights. As it turns out, we in fact only need to compute the first half of these weights. For any Wn, we
can show that:
Wn+N/2 = −Wn
(7)
The proof of this identity is trivial, and is left as an exercise for the reader. Using this identity, we just need to compute
Wn for n = [0, 1, . . .(N/2 − 1)].
Step 3. Do the transformation. Once the input array is re–ordered in the bit reversed order and the W values are
computed, we can easily perform the transform by starting with a two-sample transform of side–by–side elements in
the shuffled array, then computing a four–sample transform with four adjacent elements, continuing until we have an
N element transform. The problem is complicated by the fact that we want an in–place transformation. We do not
have a separate H array to store the transformed data; rather the original h array is over–written with the computed H
elements.
In our example, we would first do a two-sample transform for each of the four sets of two points: {H[0], H[1]},
{H[2], H[3]}, {H[4], H[5]}, {H[6], H[7]},
Note that above we refer to the elements with the symbol H rather than h, since each of the elements are the result
of a one–point transform which we already know is simply the point unmodified. For the first two point transform,
from equation 2 we can see that the first set would be:
3
H[0] = He
0 mod (2/2) + W0
2 Ho
0 mod (2/2) = H[0] + W0
2 H[1]
H[1] = He
1 mod (2/2) + W1
2 Ho
1 mod (2/2) = H[0] + W1
2 H[1]
(8)
although we have to very careful about the W values above. To clarify these weights, we use a new notational
convention Wk
N . The subscript N indicates the number of points in the transform and the superscript is of course the
power. Recall that we pre–computed the weights in step 2 above, but these precomputed weights were for a eight point
transform (in our example). In this step we are doing a two point transform, which apparently will result in different
weight factors (since the definition of W in equation 1 has N in the definition). Given this, it appears that we have
to re–compute the weights for each transform size N = 2, 4, ... Luckily, this is not the case. If we start with weights
computed for an N point transform we can prove that for a x point transform (for all x where x
m = N for some
m 0),
Wk
x = W
kN/x
N (9)
The proof of this is left as an exercise. Returning to our example, since we have pre–computed weights for N = 8, we
use:
W0
2 = W
0(8/2)
8 = W0
8
W1
2 = W
1(8/2)
8 = W4
8 = −W0
8
(10)
Therefore, assuming we stored our pre–computed weights in array W, for the 2–point transform we end up with:
H[0] = He
0 mod (2/2) + W0
2 Ho
0 mod (2/2) = H[0] + W0
2 H[1] = H[0] + W[0]H[1]
H[1] = He
1 mod (2/2) + W1
2 Ho
1 mod (2/2) = H[0] + W1
2 H[1] = H[0] − W[0]H[1]
(11)
We would have similar equations for the other three sets of two–point transforms. Continuing to the four–point
transforms, we end up with (for the first set of four for example):
H[0] = He
0 mod (4/2) + W0
4 Ho
0 mod (4/2) = H[0] + W0
8 H[2] = H[0] + W[0]H[2]
H[1] = He
1 mod (4/2) + W1
4 Ho
1 mod (4/2) = H[1] + W2
8 H[3] = H[1] + W[2]H[3]
H[2] = He
2 mod (4/2) + W2
4 Ho
2 mod (4/2) = H[0] + W4
8 H[2] = H[0] − W[0]H[2]
H[3] = He
3 mod (4/2) + W3
4 Ho
3 mod (4/2) = H[1] + W6
8 H[3] = H[1] − W[2]H[3]
(12)
In coding this, we must be careful in that we are using a transform–in–place, meaning the output array H is in fact the
input array h. Notice that in the above equations, we overwrite H[0] in the first equation, but use it on the right–hand–
side in later equations. This means we likely would need one or more temporary variables store the original values
inside of this processing loop.
We continue transforming larger and larger sample sets (increasing by a factor of two each time) until our final
transform is all N samples and the problem is solved.
Graduate Students. Grad students must also implement and call an inverse transform using the same algorithm
and same number of threads. The result of the inverse transform should match the original image.
Copying the Project Skeletons
1. Log into deepthought19.cc using ssh and your prism log-in name.
2. Copy the files from the ECE6122 user account using the following command:
/usr/bin/rsync -avu /nethome/ECE6122/ThreadsTransform2D .
Be sure to notice the period at the end of the above command.
3. Change your working directory to ThreadsTransform2D
cd ThreadsTransform2D
4. Copy the provided threadDFT2d-skeleton.cc to threadDFT2d.cc as follows:
4
cp threadDFT2d-skeleton.cc threadDFT2d.cc
5. Then edit threadDFT2d.cc to implement the transform.
(a) Create 16 threads to work in parallel to compute the two–dimensional DFT.
(b) Implement and call the one–dimensional DFT for the necessary rows using the Danielson–Lanczos approach in the equations above
(c) Use a barrier to insure all threads have completed the rows.
(d) Use the same algorithm to compute the one–dimensional DFT for the necessary columns.
(e) The main program should wait (using a condition variable) until all threads are done, then save the results
in file MyAfter2D.txt using the SaveImageData method in class InputImage.
6. Compile your code using make as follows:
make
7. Test your solution with the provided inputs. Testing is done by running your program on deepthought19 (or 17)
./threadDFT2d
Resources
1. threadDFT2d-skeleton.cc is a starting point for your program.
2. Complex.cc and Complex.h provide a completed C++ object containing a complex (real and imaginary
parts) value.
3. Makefile is a file used by the make command to build threadDFT2d.
4. Tower.txt is the input dataset, a 1024 by 1024 image of the Tech tower in black and white.
5. after1d.txt is the expected value of the DFT after the initial one–dimensional transform on each row, but
before the column transforms have been done.
6. after2d.txt is the expected output dataset, a 1024 by 1024 matrix of the transformed values.
7. after2dInverse.txt is the expected result after the inverse transformation.
8. InputImage.cc and InputImage.h that will ease the reading of the input data. This object has several
useful functions to help with managing the input data.
(a) The InputImage constructor, which has a char* argument specifying the file name of the input image.
(b) The GetWidth() function that returns the width of the image.
(c) The GetHeight() function that returns the height of the image.
(d) The GetImageData() function returns a one-dimensional array of type Complex representing the
original time-domain input values.
(e) The SaveImageData function writes a file containing the transformed data.
(f) The SaveImageDataReal function writes a file containing the transformed data, real part only. This
shold be used to write the final results of the inverse transform (grad students only) since the original image
had real parts only, the inverse transform should match and have no imaginary parts.
Turning in your Project. Information about turning in your project will be provided.
5

More products